Re: CGI permissions for targeted policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes exactly; the tmp file is being created by php and then the CGI program reads the file.

On Apr 1, 2005, at 10:57 AM, Daniel J Walsh wrote:

Ben wrote:

I have been having some problems with a CGI program, and audit2allow shows I should add these permissions:

allow httpd_sys_script_t devpts_t:chr_file { read write };
allow httpd_sys_script_t httpd_tmp_t:file getattr;
allow httpd_sys_script_t httpd_tmp_t:file read;

I'm pretty green at SELinux, so I'm not too sure what these allow. I suspect that the last rule lets httpd_sys_script_t programs read files of type httpd_tmp_t, and the second rule lets them stat() those files. What does the first rule mean, exactly? The CGI program I'm trying to run creates a random filename, and I expect this is related to that, but there ends my speculation.

The first error is the httpd script trying to access a terminal. The other errors are httpd trying to read the tmp file. Is the tmp file
created by a builtin function (php)? And the a cgi script runs to read it?


Dan

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
http://www.redhat.com/mailman/listinfo/fedora-selinux-list



--


-- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx http://www.redhat.com/mailman/listinfo/fedora-selinux-list


[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux